Analysis
-
max time kernel
33s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 01:15
Static task
static1
Behavioral task
behavioral1
Sample
81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe
-
Size
495KB
-
MD5
23060ccfc90d21321420bda396ce8f8e
-
SHA1
69239688b9089a3ba073bf88e0fc60c9bbe0efcc
-
SHA256
81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62
-
SHA512
a45c413e5cba8e09c7f418af7c74070178c94acea4433ce240c0f8f1d961eab65dd52288a9b7dfbb479080486ba847b661cbcfe39bc9b7a209c91599f6b9424d
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3736 powershell.exe 3736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3736 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3808 wrote to memory of 3556 3808 81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe 76 PID 3808 wrote to memory of 3556 3808 81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe 76 PID 3808 wrote to memory of 3556 3808 81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe 76 PID 3556 wrote to memory of 3736 3556 cmd.exe 78 PID 3556 wrote to memory of 3736 3556 cmd.exe 78 PID 3556 wrote to memory of 3736 3556 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe"C:\Users\Admin\AppData\Local\Temp\81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\81982f45f90c69f5fbdf0bb34273a99c1a9d1d8b1b51a307cb4b3dfa829bae62.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-